command-line-murders/i-00baa51fad562d866
by SadServersMore by SadServers
# Define the range of ports you want to test (from PORT_START to PORT_END) PORT_START=1 PORT_END=65535 # Define the target host (localhost in this case) TARGET_HOST="localhost" # Loop through the range of ports and run curl with a 1-second timeout for ((port = PORT_START; port <= PORT_END; port++)); do "$TARGET_HOST:$port" &>/dev/null if [ $? -eq 0 ]; then echo "Port $port is open" fi done
taipei/i-05ea7b30c835c60a9 03:55
by SadServersdrwx------ 3 admin admin 4.0K Sep 17 17:15 .ansible -rw-r--r-- 1 admin admin 220 Aug 4 2021 .bash_logout -rw-r--r-- 1 admin admin 3.5K Aug 4 2021 .bashrc drwxr-xr-x 3 admin admin 4.0K Mar 4 19:09 .config -rw-r--r-- 1 admin admin 807 Aug 4 2021 .profile drwx------ 2 admin admin 4.0K Sep 17 16:44 .ssh drwxr-xr-x 2 admin root 4.0K Sep 17 17:28 agent drwxr-xr-x 2 admin root 4.0K Mar 4 19:19 data -rw-r--r-- 1 admin admin 763K Sep 17 17:28 datafile.xz -rwxr-xr-x 1 admin root 2.2M Sep 17 17:28 kihei admin@i-0d1a37bdfe942aeab:~$ cp datafile.xz data admin@i-0d1a37bdfe942aeab:~$ cd data/ admin@i-0d1a37bdfe942aeab:~/data$ unxz datafile.xz admin@i-0d1a37bdfe942aeab:~/data$ mv datafile newdatafile admin@i-0d1a37bdfe942aeab:~/data$ cd .
kihei/i-0d1a37bdfe942aeab 08:35
by SadServersadmin@i-08c43809f7342e8fa:~$ cat ~/mysolution Unauthorized admin@i-08c43809f7342e8fa:~$ md5sum ~/mysolution be3c5cdccf225ae191b14b7dcef21246 /home/admin/mysolution admin@i-08c43809f7342e8fa:~$ echo "Unauthorized" > ~/mysolution ^C admin@i-08c43809f7342e8fa:~$ curl --user admin -D- http://localhost:5000/ Enter host password for user 'admin': HTTP/1.1 200 OK Server: Werkzeug/2.3.7 Python/3.9.2 Date: Wed, 27 Dec 2023 18:56:03 GMT Content-Type: text/html; charset=utf-8 Content-Length: 12 Connection: close Unauthorizedadmin@i-08c43809f7342e8fa:~$